Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Turning Cloud Detections into Cross-Domain Defense

Modern breaches rarely stay confined to a single domain. Viewed in isolation, each step of an attack can appear routine. But connected, they reveal a coordinated attack in progress. This is where many existing security strategies fall short. Posture tools confirm configurations are correct. Traditional security information and event management (SIEM) solutions collect logs. But when an adversary uses valid credentials and native cloud capabilities, the challenge shifts from risk visibility to detecting and stopping active abuse across domains.

AI on the Radar: Securing AI Driven Development

Join Vandana and Rob in this insightful webinar exploring the rapidly evolving landscape of AI security. As we shift from simple query-response models to complex autonomous agents that can plan, execute code, and access sensitive APIs, the traditional security "locks" are no longer sufficient. This session dives deep into the OWASP AI Exchange, a community-driven initiative providing practical guidance and technical controls for securing AI systems.

Cisco's SD-WAN 0-Day - The 443 Podcast - Episode 360

This week on the podcast, we discuss the recently disclosed and patched 0-Day vulnerability in Cisco's Catalyst SD-WAN Controller which has been under active exploit for 3 years. After that, we cover the latest open source supply chain attack involving a self-propagating worm targeting AI tools. We end with a discussion about another social engineering campaign targeting job hunters in the software development world.